Received: by 2002:a05:7412:b995:b0:f9:9502:5bb8 with SMTP id it21csp7626192rdb; Thu, 4 Jan 2024 02:31:52 -0800 (PST) X-Google-Smtp-Source: AGHT+IHxe1VWT75Ym9vP3tSfrxdjXAPlYE3qfnjwOUG45sGW1xR9im1AwONg77egQTg/MT5SEOJp X-Received: by 2002:ac8:7d44:0:b0:428:1e16:3957 with SMTP id h4-20020ac87d44000000b004281e163957mr429836qtb.24.1704364312450; Thu, 04 Jan 2024 02:31:52 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1704364312; cv=none; d=google.com; s=arc-20160816; b=YCd6PXu0ZKh7cSD6ax6TMKrLN6OEagjIms32Upwc0C8aHJL7LIjV89fM61ewPz/k0+ UFFG8Dpi1GIyLD8YKhA7lXns2JIxHE/KQBILwQBhGJV8PUu39eo+VH8dOf275UmO3+cD eImtW+qlrg6fYjMhqvaXriOAIm0nKppuA4vTaqy+JcwnGPMVExbp+OUSZsjEAHVbbS/t nTStgC6F7DlcFe9n80pmwjnBqW8k+4q2e4M7mtl4vvA82fz/9DMNwGiQtyTheJeHm/oD K9IxB9vQFskgSC7DdcOBIOdt1BoRtCLZ+E2BDA+r1a3Yu2Q0pB0ZoAVmdLMiRSMO20e7 XQBg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=in-reply-to:content-disposition:mime-version:list-unsubscribe :list-subscribe:list-id:precedence:references:message-id:subject:cc :to:from:date:dkim-signature; bh=0rxushcfZyl8L0hy6S9Km4lGh2/dzw7ZO9lKAm8opZ8=; fh=G4yV1t4QbuObAOJ4km1MKIWGWls1sgCMwhrPN0h+SCY=; b=VIr78VNeR4QkbgpUz9rQ/07t3UskmEirQVtl/3PjPnIMkZaZe/47FdCKahtLe26Vzl 4JXQQE48S9kyUXkc4avuQCHcP0wZ56vooLq8II1o2RkFPUYPMVlKxIqNVsMPSo9J6auO igRrixHG7q7MA9VU/JclbK4SqdAc3uQVTsFlUG3KWkJgrBa3ov2ELSOYGTlRHMHODg3F oMRD7JtZEyx/RDjd5A5nCnsy/qkV87luQb2+Kn4GkM08Zol9e15MAQip4FGDi2y0k1Im I1985667J4HYkx3g1P17g6nv472C6A5zVcOknBC82s+9s5MbEBKypPnVqXSsPKpnXjIB 8GGg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@alien8.de header.s=alien8 header.b=V2d40fYB; spf=pass (google.com: domain of linux-crypto+bounces-1230-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.199.223 as permitted sender) smtp.mailfrom="linux-crypto+bounces-1230-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=alien8.de Return-Path: Received: from ny.mirrors.kernel.org (ny.mirrors.kernel.org. [147.75.199.223]) by mx.google.com with ESMTPS id fj7-20020a05622a550700b00427f4748aa6si16634276qtb.279.2024.01.04.02.31.52 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 04 Jan 2024 02:31:52 -0800 (PST) Received-SPF: pass (google.com: domain of linux-crypto+bounces-1230-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.199.223 as permitted sender) client-ip=147.75.199.223; Authentication-Results: mx.google.com; dkim=pass header.i=@alien8.de header.s=alien8 header.b=V2d40fYB; spf=pass (google.com: domain of linux-crypto+bounces-1230-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.199.223 as permitted sender) smtp.mailfrom="linux-crypto+bounces-1230-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=alien8.de Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ny.mirrors.kernel.org (Postfix) with ESMTPS id 352D51C23A41 for ; Thu, 4 Jan 2024 10:31:52 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id CA82D20B33; Thu, 4 Jan 2024 10:31:39 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dkim=pass (4096-bit key) header.d=alien8.de header.i=@alien8.de header.b="V2d40fYB" X-Original-To: linux-crypto@vger.kernel.org Received: from mail.alien8.de (mail.alien8.de [65.109.113.108]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id AC5A820DE1; Thu, 4 Jan 2024 10:31:36 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=alien8.de Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=alien8.de Received: from localhost (localhost.localdomain [127.0.0.1]) by mail.alien8.de (SuperMail on ZX Spectrum 128k) with ESMTP id 7C1B540E0202; Thu, 4 Jan 2024 10:31:33 +0000 (UTC) X-Virus-Scanned: Debian amavisd-new at mail.alien8.de Authentication-Results: mail.alien8.de (amavisd-new); dkim=pass (4096-bit key) header.d=alien8.de Received: from mail.alien8.de ([127.0.0.1]) by localhost (mail.alien8.de [127.0.0.1]) (amavisd-new, port 10026) with ESMTP id cpt72dB3zF74; Thu, 4 Jan 2024 10:31:31 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=alien8.de; s=alien8; t=1704364291; bh=0rxushcfZyl8L0hy6S9Km4lGh2/dzw7ZO9lKAm8opZ8=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=V2d40fYBXLsjiwgw88xJEJal0iK5jhfOdiiW5CFmq7CsA30eB3UEH5tslaIptPYHx AiKsFb6HXIdUELKJTNpqrJ+OtNud5zqyBzQO12LOoH6NGEzs213S/tk5v/52ynLT+d BMUbP6o8Hi5BWVifZygd83cULDxVy73O2SgyQiBLTg/+hDTkamGbeymlReg9rcHoE2 qb0hcW/GpP5dnDESmgo7cEDUG5p9xnZrGBlZk/BzCIXjhvzIKEkQmTdJsLz2hR9f5Y 3e/8k6phnvZM8lA8qSM7zaOWOJp3eL9Tc+otbB0CH8PvK46AXOGxw1FN1ZCd2oaGD7 indn2kf4LREaQl/JX+VTc0TLlwQNTp2WyLiBjla+Bw720a4k9qAZa9W7O5cQQKgwp7 3HT2ReBRVycQg//veJFInytfO5HSRvVRcuJbA0MPCcLvSvs8oi9YMpQ4q1qn0bzL+5 2UximNaMGXpHLlqLvXpeC2zshznqUwr9JofQc+LA8WBk+mL2P6pNm7ZxUHu8VyYs0d fc9TkDWvo4d7PMa4lnjQcWjHYn0Sf7srHrNS7OtjNQd21AGPYlE3GKV146o5opcokD 0FvC5c4D1ZHKr5ycn1wFc1eWC9g48Qqj6QE89nWfm6ewVFLsyBNsoFSTzvr+7wDdPE uPUiPUyJWMXVD9UcdHdhHnFY= Received: from zn.tnic (pd9530f8c.dip0.t-ipconnect.de [217.83.15.140]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange ECDHE (P-256) server-signature ECDSA (P-256) server-digest SHA256) (No client certificate requested) by mail.alien8.de (SuperMail on ZX Spectrum 128k) with ESMTPSA id D2A6C40E0177; Thu, 4 Jan 2024 10:30:53 +0000 (UTC) Date: Thu, 4 Jan 2024 11:30:47 +0100 From: Borislav Petkov To: Michael Roth Cc: x86@kernel.org, kvm@vger.kernel.org, linux-coco@lists.linux.dev, linux-mm@kvack.org, linux-crypto@vger.kernel.org, linux-kernel@vger.kernel.org, tglx@linutronix.de, mingo@redhat.com, jroedel@suse.de, thomas.lendacky@amd.com, hpa@zytor.com, ardb@kernel.org, pbonzini@redhat.com, seanjc@google.com, vkuznets@redhat.com, jmattson@google.com, luto@kernel.org, dave.hansen@linux.intel.com, slp@redhat.com, pgonda@google.com, peterz@infradead.org, srinivas.pandruvada@linux.intel.com, rientjes@google.com, tobin@ibm.com, vbabka@suse.cz, kirill@shutemov.name, ak@linux.intel.com, tony.luck@intel.com, sathyanarayanan.kuppuswamy@linux.intel.com, alpergun@google.com, jarkko@kernel.org, ashish.kalra@amd.com, nikunj.dadhania@amd.com, pankaj.gupta@amd.com, liam.merwick@oracle.com, zhi.a.wang@intel.com Subject: Re: [PATCH v1 03/26] iommu/amd: Don't rely on external callers to enable IOMMU SNP support Message-ID: <20240104103047.GDZZaI11z9Htj3XS/P@fat_crate.local> References: <20231230161954.569267-1-michael.roth@amd.com> <20231230161954.569267-4-michael.roth@amd.com> Precedence: bulk X-Mailing-List: linux-crypto@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Disposition: inline In-Reply-To: <20231230161954.569267-4-michael.roth@amd.com> On Sat, Dec 30, 2023 at 10:19:31AM -0600, Michael Roth wrote: > +static void iommu_snp_enable(void) > +{ > +#ifdef CONFIG_KVM_AMD_SEV > + if (!cpu_feature_enabled(X86_FEATURE_SEV_SNP)) > + return; > + /* > + * The SNP support requires that IOMMU must be enabled, and is > + * not configured in the passthrough mode. > + */ > + if (no_iommu || iommu_default_passthrough()) { > + pr_err("SNP: IOMMU is disabled or configured in passthrough mode, SNP cannot be supported.\n"); > + return; > + } > + > + amd_iommu_snp_en = check_feature(FEATURE_SNP); > + if (!amd_iommu_snp_en) { > + pr_err("SNP: IOMMU SNP feature is not enabled, SNP cannot be supported.\n"); > + return; > + } > + > + pr_info("IOMMU SNP support is enabled.\n"); > + > + /* Enforce IOMMU v1 pagetable when SNP is enabled. */ > + if (amd_iommu_pgtable != AMD_IOMMU_V1) { > + pr_warn("Forcing use of AMD IOMMU v1 page table due to SNP.\n"); > + amd_iommu_pgtable = AMD_IOMMU_V1; > + } Kernel code usually says simple " enabled" not " is enabled". Other than that, LGTM. --- diff --git a/drivers/iommu/amd/init.c b/drivers/iommu/amd/init.c index 1ed2ef22a0fb..2f1517acaba0 100644 --- a/drivers/iommu/amd/init.c +++ b/drivers/iommu/amd/init.c @@ -3231,17 +3231,17 @@ static void iommu_snp_enable(void) * not configured in the passthrough mode. */ if (no_iommu || iommu_default_passthrough()) { - pr_err("SNP: IOMMU is disabled or configured in passthrough mode, SNP cannot be supported.\n"); + pr_err("SNP: IOMMU disabled or configured in passthrough mode, SNP cannot be supported.\n"); return; } amd_iommu_snp_en = check_feature(FEATURE_SNP); if (!amd_iommu_snp_en) { - pr_err("SNP: IOMMU SNP feature is not enabled, SNP cannot be supported.\n"); + pr_err("SNP: IOMMU SNP feature not enabled, SNP cannot be supported.\n"); return; } - pr_info("IOMMU SNP support is enabled.\n"); + pr_info("IOMMU SNP support enabled.\n"); /* Enforce IOMMU v1 pagetable when SNP is enabled. */ if (amd_iommu_pgtable != AMD_IOMMU_V1) { -- Regards/Gruss, Boris. https://people.kernel.org/tglx/notes-about-netiquette